Skip to content

Commit

Permalink
Resolve #1812 by removing a low impact temp password storage
Browse files Browse the repository at this point in the history
  • Loading branch information
tghosth committed Nov 6, 2024
1 parent 4387c84 commit e0e69f9
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion 5.0/en/0x11-V2-Authentication.md
Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@ Unsafe out-of-band authentication mechanisms such as e-mail and VOIP are not per
| **2.7.2** | [MODIFIED] Verify that out-of-band authentication requests, codes, or tokens expire within 10 minutes. |||| 287 | 5.1.3.2 |
| **2.7.3** | [GRAMMAR] Verify that out-of-band authentication requests, codes, or tokens are only usable once, and only for the original authentication request. |||| 287 | 5.1.3.2 |
| **2.7.4** | [GRAMMAR] Verify that the secondary communications channel being used is secure and independent of the primary channel. |||| 523 | 5.1.3.2 |
| **2.7.5** | [GRAMMAR] Verify that the authentication server only retains a hashed version of the authentication code at the back-end. | | || 256 | 5.1.3.2 |
| **2.7.5** | [DELETED, INSUFFICIENT IMPACT] | | | | | |
| **2.7.6** | [MODIFIED] Verify that codes used in out-of-band authentication are generated using a cryptographically secure random number generator (CSPRNG) and contain at least 20 bits of entropy (typically 4 random alphanumeric characters or 6 random digits is sufficient). | ||| 310 | 5.1.3.2 |
| **2.7.7** | [ADDED] Verify that a code based out-of-band authentication mechanism is protected against brute force attacks by using either rate limiting or a code with at least 64 bits of entropy. | ||| 307 | 5.1.3.2 |

Expand Down

0 comments on commit e0e69f9

Please sign in to comment.